integrity constraint
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 3)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Vol 19 (4) ◽  
pp. 604-611
Author(s):  
Fabio Miranda Reina ◽  
Alexis Huf ◽  
Daniel Presser ◽  
Frank Siqueira

Author(s):  
Hannah Sande

This paper examines two case studies of morpheme-specific reduplication that copy from a syntactic domain larger than a root but smaller than a word, providing an analysis in Cophonologies by Phase (CBP) of both morpheme-specific phonotactic requirements in different reduplication processes and of the amount of structure copied in reduplication. The first case study comes from Guébie (Kru, Ivory Coast), where reduplication marks both nominalization and reciprocals (among others). In both morphosyntactic environments, reduplication copies the verb plus valency-changing affixes, but the reduplicants are subject to different sets of phonotactic restrictions. The second case study comes from Kinande (Bantu, Democratic Republic of Congo) where there is reduplication of nouns as well as verbs. Nominal and verbal reduplication both involve a two-syllable reduplicant that copies from the root plus some--but not all--affixes, and both are subject to a morpheme integrity constraint. However, the two reduplication processes differ in whether they are prefixing or suffixing, whether they copy from right-to-left or left-to-right, and in which repair to the morpheme integrity constraint is preferred.While other frameworks such as traditional Cophonology Theory, Stratal OT, or Indexed Constraints could also account for the morpheme-specific phonological behavior of reduplicants, CBP has the added benefit of straightforwardly accounting for the amount of structure that serves as the base of reduplication in each case. This paper contributes to the growing literature on morphophonological interactions that can be accounted for within CBP.


2020 ◽  
Vol 38 (02) ◽  
Author(s):  
CHUNG PHAM VAN

Checking integrity constraints in real-time the database is an important field of investigation. In this paper, we implement topological integrity constraints depending on which user has chosen an integrity constraint on different times on many existing integrity constraints of temporal databases. We suggested using the Hamiltonian paths in directed graphs order to implement a test program on data simulated by a college's real data. The object needs to satisfy integrity constraints in temporal databases as students who have enrolled in the subjects. Moreover, the program also monitors the learning process and advises students to choose courses in the school's training program.


2018 ◽  
Vol 15 (3) ◽  
pp. 821-843
Author(s):  
Jovana Vidakovic ◽  
Sonja Ristic ◽  
Slavica Kordic ◽  
Ivan Lukovic

A database management system (DBMS) is based on a data model whose concepts are used to express a database schema. Each data model has a specific set of integrity constraint types. There are integrity constraint types, such as key constraint, unique constraint and foreign key constraint that are supported by most DBMSs. Other, more complex constraint types are difficult to express and enforce and are mostly completely disregarded by actual DBMSs. The users have to manage those using custom procedures or triggers. eXtended Markup Language (XML) has become the universal format for representing and exchanging data. Very often XML data are generated from relational databases and exported to a target application or another database. In this context, integrity constraints play the essential role in preserving the original semantics of data. Integrity constraints have been extensively studied in the relational data model. Mechanisms provided by XML schema languages rely on a simple form of constraints that is sufficient neither for expressing semantic constraints commonly found in databases nor for expressing more complex constraints induced by the business rules of the system under study. In this paper we present a classification of constraint types in relational data model, discuss possible declarative mechanisms for their specification and enforcement in the XML data model, and illustrate our approach to the definition and enforcement of complex constraint types in the XML data model on the example of extended tuple constraint type.


2016 ◽  
Vol 32 (3) ◽  
pp. 397-426 ◽  
Author(s):  
Geoffrey Schwartz

Acoustic and perceptual studies investgate B2-level Polish learners’ acquisition of second language (L2) English word-boundaries involving word-initial vowels. In production, participants were less likely to produce glottalization of phrase-medial initial vowels in L2 English than in first language (L1) Polish. Perception studies employing word monitoring and word counting tasks found that glottalization of word-initial vowels had a negligible impact on the processing of L2 word boundaries. Taken together, these experiments suggest that B2-level learners are relatively successful in acquiring word-boundary linking processes that are for the most part absent from L1 Polish, and challenge the notion of an L2 ‘Word Integrity’ constraint. The cross-language interactions observed in these experiments are compatible with the claim that the realization of word-initial vowels is governed by a representational parameter, which may be derived in the Onset Prominence framework.


Sign in / Sign up

Export Citation Format

Share Document